You have installed anti-virus software on computers at your business. within a few days, however, you notice that one computer has a virus. when you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. she admits she did not scan the file before running it. what should you add to your security measures to help prevent this from happening again

Answers

Answer 1
Create an administrator account to monitor the rest of the accounts and makes permanent changes on the computer. Every other account should not be allowed to make any kind of changes

Related Questions

As allocated by the os, the resources that are apparent to a program or user are called ____.

Answers

Virtual Resources 


Good luck! (:

As allocated by the OS, the resources that are apparent to a program or user are called consumable resources.

As allocated by the OS, the resources that are apparent to a program or user are called consumable resources. These resources include CPU time, memory, storage, and network bandwidth which the operating system manages and allocates to different programs running on the system. Additionally, the API (Application Programming Interface) serves as the interface.

Through this interface programs interact with the hardware by making requests to the operating system, ensuring fair access to resources and preventing monopolization. Understanding resource allocation in an operating system is crucial for efficient program execution and system stability, as the OS governs how programs access and utilize hardware resources.

If Carly wants to add wind belts for the part of the Atlantic just south of the equator, how should she draw the arrows?The arrows should curve upward to the left.The arrows should curve upward to the right.The arrows should curve downward to the left.The arrows should curve downward to the right.

Answers

If Carly wants to add wind belts for the part of the Atlantic just south of the equator, she should draw the arrows upward to the left.  At the South of the equator are trade winds which blow wind from the northeast toward the equator. 

Category 6 is an example of a ________ used to connect wired network devices.

Answers

Category 6 is an example of a cable used to connect wired network devices

Ccna which level of the internet of things reference model describes data storage?

Answers

 The Internet of Things (IoT)) reference model provides clear definitions and descriptions for all elements and functions in the  IoT systems and applications.
Level 4 of the IoT reference model, called  Data Accumulation describes the data storage. This fourth level captures data and puts it at rest.So it is now usable by applications on a non-real-time basis.

In which stage of the design process does the designer ask him or herself what the audience already knows about thes problem

A. identify the need or problem
B. research the problem
C. build the prototype
D. communicate the solution

Answers

The designer will ask him or herself during the problem statement stage what the audience or user already knows about the problem. A. Identify the need or problem.

Which windows command always navigates the command-line interface back to the root directory?

Answers

The answer is "cd \".

Which of the following jobs are most likely to be in greater demand due to the increasing prevalence of mobile computing? desktop publishing mouse manufacturing search engine optimization and marketing (SEO/SEM) user interaction design CAD/CAM programming web analytics

Answers

Desktop publishing mouse manufacturing search engine optimization and marketing (SEO/SEM) is your answer.

A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

Answers

From the perspective of the client,  the correct order of the protocol stack that is used to prepare the request for transmission for a webpage to a web server is:
HTTP - The Hypertext Transfer Protocol 
TCP  -
Transmission Control Protocol
IP  -
Internet Protocol
Ethernet

If you have long column labels with columns so wide that they affect the readability of a worksheet you should first

Answers

You should first .consider how you could shorten the column labels.
Shortening the column labels could be easily done by dragging the column to the size that we want. But when shortening the column labels, some problems might occur such as the content might be distorted and in will become unevenly placed.
How you shorter the column lavels

Sam and Ella are arguing in the cafeteria. Sam says that if he throws a chicken tender with a greater speed, it will have a greater inertia. Ella argues that inertia does not depend upon speed, but rather upon mass. Who do you agree with?


A. neither is correct

B. Sam

C. Ella

Answers

ella im pretty suree let me know if im wrong

Ella is correct. Because Inertia is not based on speed, it is based on mass.

Which option will you use to expose your presentation to the audience?
A)Slide Layout
B)Slide Show
C)Slide Orientation
D)Slide Master

Answers

Which option will you use to expose your presentation to the audience?
B)Slide Show

You will use the Slide Show option to expose your presentation to the audience. Correct answer: B

In order to begin a presentation from the current slide you should select the Slide Show view command at the bottom of the PowerPoint window . On the Slide Show menu select Set Up Show or Rehearse Timings.

Alpha Technologies, a newly established company, wants to share information about its work with people all over the world. Which type of server should this company use to upload their information?
A-web server
B-mail server
C-database server
D-file server

Answers

Option A, Web Server, because it is a type of HTTP server used to direct web pages and blogs, as a method of transmitting information through a web platform for personal or business use, to publicize a business or an organization. In this way, information about the company is transmitted through web pages that use this type of server.

Describe at least three things you could do to prepare for giving an effective and engaging business presentation. (1-3 sentences. 3.0 points)

Answers

Answer:

   Business presentation is a vital day to day tool for every business consultant, entrepreneur or sales executive. It is with her that prepares every speech and convincing technique to impress the customers.

    So here are 6 basic tips for you to build the best business presentation of your life step by step.

1- Study your audience.

2- The presentation cannot be too long.

3- It has to have beginning, middle and end.

4- Do not roll up, be objective.

5- Clearly show the benefits of the solution / service / product you will offer.

6- Test before presenting.

Which type of operation writes the file system structure to the disk?

Answers

Formatting writes the file system structure to the disk.

The type of operation that writes the file system structure to the disk is a formatting operation. During formatting, the necessary file system structure is written, enabling organized data and device management in Unix. This process ensures efficient interaction between devices and data.

The type of operation that writes the file system structure to the disk is called a formatting operation. When you format a disk, the operating system writes the necessary file system structure, such as directories and tables, to the disk, enabling the organization and management of files.In the context of the Unix filesystem, everything is treated as a file. This includes traditional files like documents and media, as well as directories and device files. For example, a music file needs to have its data written to a device file connected to the sound card to be played. Similarly, when typing in a terminal, characters are read from a file representing the keyboard and written to a file representing the monitor.During the formatting process, the operating system sets up this file system structure, ensuring that devices and data can interact efficiently and in an organized manner.

A newspaper publishes a negative editorial on how local politicians are dragging their feet in building a new bridge. Select the correct statement.

A.The editorial is data.

B.The editorial contains data but is not data itself.

C.The editorial is facts.

D.Newspapers are not data.

Answers

Your answer would be
A. The editorial is data.
I just took this test :)

The answer is A. The editorial is data. ^^

7. Glaciers have two types of deposition. Define them below:

Answers

The Glacial deposition is the settling of sediments left behind by a moving glacier. As glaciers move over the land, they pick up sediments and rocks. The mixture of unsorted sediment deposits carried by the glacier is called glacial till. Piles of till deposited along the edges of past glaciers are called moraines.

. Does Zuckerberg believe in the thought that “the endpoint is when you sell the
company, or go public?”

Answers

Zuckerberg does not believe that selling the company is the endpoint. He says that, "...a lot of people who I think build startups or companies think that selling the company or going public is this endpoint. Right, it's like you win when you go public. And that's just not how I see it."

Discuss three ways you could (or currently do) use the Excel software in your personal or professional life. Provide examples and explain why Excel is an effective choice over other programs or apps.

Answers

Both in my personal and professional life, I use the Excel software in order to create tables and lists. It's much easier to do that in Excel rather than in Word, for example, because Excel was actually created for that purpose, whereas Word was created for writing, above all. I use Excel for work to create tables of various things, such as names, emails, payments, etc. whereas I use it in my personal life to create lists of things such as movies, books, etc.

Which two protocols can be used to gain remote access specifically to a server's command line interface, securely and unsecurely?

Answers

Telnet and SSH are two protocols that can be used to gain remote access specifically to a server's command line interface.

Software, consisting of programs and data, that runs on computers, manages computer hardware resources, and provides common services for executions of various application software

Answers

Probably an Operating System like Mac, Linux, or Windows. There may be a type of downloadable software to do this, but may be debatably safe.

Software, consisting of programs and data, that runs on computers, manages computer hardware resources, and provides common services for the execution of various application software is an operating system (OS).

The OS manages and schedules process running on the computer, ensuring fair and efficient utilization of system resources.  It interacts with and manages input and output devices, such as keyboards, mice, printers, and network adapters, enabling communication between software and hardware components.

The OS provides a user-friendly interface for users to interact with the computer system.

Learn more about the operating system, here:

https://brainly.com/question/29532405

#SPJ2

Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate with each other and share files?

Answers

SMB is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate with each other and share files.
Hope this helps!

External hard disks use different technology than internal hard disks. ture or false

Answers

False. They have a case and frequently a gizmo that takes their SATA (or whatever) cable and adapts it to USB (or whatever).

Answer:

false

Explanation:

To create a new blank document, the user should _____. select New from the File tab select Open from the Quick Access toolbar select New from the Home tab select Save on the File tab

Answers

select New from the File tab
Hope it helped!
SELECT NEW FROM THE FILE TAB

Finding information on the web was made easier by _____________, which provide on-screen menus, making navigation of the web as simple as pointing and clicking.

a. software links

b. operating systems

c. protocols

d. search engines

Answers

The answer is A. Software Links 

In what type of server cluster can services fail over from downed servers to functional servers?

Answers

Symmetric server is the type of server cluster in which services can fail over from downed servers to functional servers. The name symmetric comes from the fact 
that all the servers (also called nodes) in the cluster are active and all applications run  simultaneously .
Final answer:

A failover cluster is a type of server cluster where services can fail over from downed servers to functional servers.

Explanation:

In a failover cluster, services can fail over from downed servers to functional servers. A failover cluster is a group of two or more servers that work together to provide high availability and scalability of applications and services. When one server fails, the services running on that server automatically fail over to another server in the cluster, ensuring uninterrupted service.

which of the following schools would adhere to an open admission guideline?
A: Connecticut College
B: Weber State College
C: Mount Holyoke Community College
D:The University of New Hampshire

Answers

C: Mount Holyoke Community College

Answer:

The answer to the following question is the option "C".  

Explanation:

In computer science, Open admissions indicate that a school's registration is not competing. It indicates that all the eligible students are welcome to apply without additional qualifications. In this question option A, B and D is a college name but in option C it is a community college that refers to the junior college. So the correct answer to this question is option C which is "Mount Holyoke Community College".

Why is making a prototype so important in the design process

Answers

Making a prototype is a great example of double checking. A prototype is the first made, which means it'll be tested. If a prototype was untested when complete, then it would be exceptionally harder to determine that everything is in working condition. No matter how skilled someone is.

In fact, skilled workers would prefer to test their prototypes to make sure it works. That way they'd stay on top.

You need to create the directory /var/oracle/database/9i. only the directory /var currently exists. from the root of the filesystem, which command will create the directory path

Answers

To create a directory, you can use the command mkdir. Below is an example:

mkdir /var/oracle/database/9i

_______ allows you to convert text to a graphic element. A. SmartArt B. Clip art C. Shapes D. WordArt

Answers

I believe the answer is D. I hope this answered your question, my friend. :)

WordArt allows you to convert text to a graphic element. WordArt is one of Microsoft applications.  

EXPLANATION  

Users can add WordArt to their spreadsheets, slides or documents in Microsoft applications, including Excel, PowerPoint, and Word. WordArt is a stylish type of text which can convert text into graphic text. WordArt allows users to make text look more attractive than plain text.

There are several types of text styles in WordArt, including: embossed text, bordered text, and dark text. Users can add WordArt using two different colors. One color becomes the boundary of the text and the other color becomes the core color of the text. After adding WordArt to the document, WordArt can be moved to any position. WordArt text size can also be changed.

To add WordArt in Microsoft Word, Excel, and PowerPoint, follow these steps:

Microsoft Word

1. Open Microsoft Word.

2. In the Ribbon, click on the Insert tab.

3. In the Text section, click on the WordArt option.

4. Select the type of WordArt you want to add to the document.

 

Microsoft Excel

1. Open Microsoft Excel.

2. In the Ribbon, click on the Insert tab.

3. On the far right side of the menu bar, click on the Text option.

4. In the Text pop-up section, click on the WordArt option.

5. Select the type of WordArt you want to add to the document.

 

Microsoft PowerPoint

1. Open Microsoft PowerPoint.

2. In the Ribbon, click on the Insert tab.

3. In the Text section, click on the WordArt option.

4. Select the type of WordArt you want to add to the document.

 

LEARN MORE

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

• WordArt styles allow you to add

 https://brainly.com/question/938171

KEYWORD: WordArt, Microsoft, technology.

Subject: Computers and technology

Class: 10 - 12

Subchapter: Microsoft

Each brochure template produces _____ pages of graphics, business information text boxes, and story boxes.
1. six
2.four
3.two
4.three

Answers

each one should produce 2 boxes

Each brochure template produces two pages of graphics, business information text boxes, and story boxes.

What is the brochure

The brochure template is known to be one that is being talked about makes four pages with pictures, boxes for writing business information, as well as those boxes for telling stories.

Therefore, based on the above, This means that when you use the template to make a brochure, it will have four pages where you can put in different pictures, boxes for business info, and boxes for stories.

Hence, one can say that option 3 is correct.

Read more about  brochure  here:

https://brainly.com/question/30657309

#SPJ2

Other Questions
A program ____ is an abstraction of a computer memory cell or collection of cells. What important accomplishments or contribution of constantine? what information does the body of a cover letter include Using some of the techniques of poetry you have studied in this unit, write a brief poem (8-10 lines). The poem may be iambic pentameter or free verse, rhymed or unrhymed. Beneath your poem, list the poetic devices that you used. Does this sentence contain a double negative? There arent any ripe bananas in this bunch. yes no What is the immense submarine mountain chain that encircles the globe called? The ________ states that individuals keep a running tally of information and use that tally to form their opinions At a health education class for teenagers, the nurse discusses the sexually transmitted infection chlamydia trachomatis. which information would the nurse most likely include? -4.2 (-2.8+4.5) what is the value of the expression Mr. Welch bought 24 ft of fencing. How many yards of fencing did he buy? (1 yd = 3 ft) Algebra Help Let f(x)=6x. The graph of f(x) is transformed into the graph of g(x) by a vertical compression of 1/3 and a translation of 2 units up.What is the equation for g(x)?Enter your answer in the box.g(x) The height of a building in a scale drawing is 9cm.The scale is 1:600.Explain how you would use the scale to find the actual height of the building. 5 different mixed numbers that add up to 10 with only 3rds and 4ths Identify the class and noun function of the pronoun using the abbreviations from the chart. For intensive pronouns, put NONE for noun function.Which of the utensils is best for serving the roast?Noun function:Pronoun class: 1.What events led to the attack at Pearl Harbor?I know that this isn't math but I just need help please. :( The volume of a cone is 31.4 cm3 and the radius is 2 cm. What is the height of the cone? Use 3.14 for . Round to the nearest tenth, if needed.A) 22.5 cm B) 7.5 cm C) 15 cm D) 41.9 cm Ten-year-old heidi is maturing early and already towers over all the girls and most of the boys in her fifth-grade class. heidi is likely to be A child sets off the firecracker at a distance of 100 m from the family house. what is the sound intensity 100 at the house? Ohio state studies of leadership identified two critical dimensions in the behavioral approaches to leadership which included Initial command of an incident should be assumed by the Steam Workshop Downloader